Effects of Social Media on Youth: Critical Essay

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Social media refers to forms of a system and email channels dedicated to open-based participation, interacting, changing ideas, and collaborating through bookmaking, and networking microbiology.

Cybercrime refers to the unlawful activities which are conducted by computer systems or the internet. It’s also the growth of crime in more densely populated areas.

This paper will discuss the relevant effects of social media on cybercrime.

Identity theft or character theft is the most common technique the scammer used. They employ the technique by use of sending incorrect emails to people claiming that they are from the bank or any economic business firm. If someone gives out their private information to the criminal, the scammer will get a chance to access all your accounts and also open another account that may be using your name but different passwords will enable you not to access the account again. Identity theft can take edges to be fixed back. Each person is advised to protect his or her private data from these scammers.

Security price tag .cybercrime criminals concentrate on a business scale, which is both large and large businesses. Hackers will crack down on their mainly targeted company’s machines or government passwords. When they have the passwords it will be easier the steal the essential information that will benefit them. They will own the firm privately. This is according to [ Rodgers-M ] 2009.

Due to cybercrime, many youths have a second life. It’s done when they watch pornographic videos on the internet and they tend to copy what they call their second life are doing on the videos. It’s a disadvantage to them because most of them will eventually drop out of school, early marriage or even be pregnant at a tender age.

Loss of essential information and evidence is the most expected problem., for in a court where there is a lot of evidence that is to be presented in the future and the detainee does not want to be jailed, he might hire a hacker to destroy the evidence or he does it by him her herself provided he has access to the computers. The client’s most essential information can be leaked from a business organization which will cause insecurity to the customer. The information may get lost forever or retrieved later.

Damage reputation, an organization or a company that gets hacked may suffer from a bad reputation and it will face many more problems even after paying the early initial damages. When this happens to any company the customers are likely not comfortable when handing their data to the company in question and they may claim for the more expensive compensation. It will result in the closing down of the company, gain a negative reputation, and the brand image of the company will be tarnished. They won’t be able to compete with other big companies. Moreover, the firm will lose more trades.

Additional charges may occur to the company or the government in question to pay the technician to come and renovate the hacked network and also the computer systems. Any organization will be forced to pay even more for safekeeping and preventing the firm from another attack. They will have to pay to buy other computers and to pay funds to the technician for the computers to be installed properly. Further, this reduces sales since the customer will shift to another company to buy their commodities. According to [D. Hadler.] 2009

Loss of job opportunities. As a result of hacking a company, the employees will be forced to evacuate, also known as the opportunity cost.

Lack of peace in your health. Trackers may go to the extent of leaking out your wearable health. They leak out your individual health information and your sleeping schedule. They will also be controlling your social media account like your Facebook, Twitter, and Instagram, and also your What Sapp account using their cellphone. Your entire life will be revolving around them.

Nevertheless, the youth have also been affected. They are being isolated from their society friends and even their parents. Their social harmony is being broken. Their personal or individual relationships maybe with their parents, friends, relatives, and even their schoolmates may break down. This will result in the youth being frustrated and moral disorder.

The youth tend to lose more time on the internet watching video link, for example, pornographic videos, instead of doing something constructive things with their lives. After watching these videos they will start to copy the same culture from their second life and end up damaging their reputation. Other youth will lose or gain pleasure after watching these videos.

References

    1. Baggili I, Rogers M (2009) Self-reported cybercrime: An analysis of the effects of anonymity and pre-employment integrity. International Journal of Cyber Criminology 3(2):550-565
    2. Patton, D., Hong, J., Ranney, M., Patel, S., Kelley, C., Eschmann, R., & Washington, T. (2014). Social media as a vector for youth violence: A review of the literature. Computers In Human Behavior, 35, 548-553. DOI:10.1016/j.chb.2014.02.043
    3. Mobile Life Youth Report. (2006). the impact of the mobile phone on the lives of young people. Car phone warehouse. Retrieved 15 August 2007 from http://www.yougov.com/archives/pdf/CPW060101004_2.pdf
    4. D. Halder, & K. Jaishankar (2011), Cybercrime and the victimization of women: laws, rights, and regulations, Information Science Reference
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!